نتایج جستجو برای: privacy and surveillance

تعداد نتایج: 16846830  

Journal: :Kybernetes 2013
Vasilios Katos Frank Stowell Peter M. Bednar

Purpose – The purpose of this paper is to develop an approach for investigating the impact of surveillance technologies used to facilitate security and its effect upon privacy. Design/methodology/approach – The authors develop a methodology by drawing on an isomorphy of concepts from the discipline of Macroeconomics. This proposal is achieved by considering security and privacy as economic good...

2005
Vincent Mosco Simon Kiss

Information and communication technology has deepened the problem of workplace surveillance by expanding the capacity to measure and monitor worker activity. Partly because of inadequate government attention to privacy protection and partly because the government itself has used security concerns to overturn privacy protections, civil society organizations and movements have increasingly taken ...

Journal: :Journal of business analytics 2021

The right to privacy has been discussed by scholars in multiple disciplines, yet issues are increasing due technological advances and lower costs for organisations adopt smart surveillance. Given the potential misuse, it seems prudent stakeholders critically evaluate Surveillance Analytics (SA) innovations. To assist balancing arising from SA adoption implications privacy, we review key terms e...

2016
Susan Athey Christian Catalini Catherine Tucker

This paper uses data from the MIT digital currency experiment to shed light on consumer behavior regarding commercial and government surveillance. This allows us to explore the apparent contradiction that many cryptocurrencies offer people the chance to escape government surveillance, but do so by making transactions themselves public. We find three main things. First, the effect of small incen...

Journal: :CAIS 2001
Robert Boncella

This article is a tutorial on Internet privacy. The objective of the tutorial is to inform users of the Internet how and why their use of the Internet can be monitored. The focus of the tutorial is Internet privacy at home and in the work place. The tutorial has three major sections: Technical Background, Privacy At Home, and Privacy At Work. The At Home section is concerned with personal priva...

2012
Ying Luo Sen-ching S. Cheung Shuiming Ye

The widespread deployment of surveillance cameras has raised serious privacy concerns and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris scans as they are immutable and highl...

Journal: :Social Science Research Network 2023

2008
Dimitra Kaklamani Iakovos Venieris

Goal of this deliverable is to review and analyse data protection algorithms. The analysis takes into account both classes of approaches that are (or can be) directly applied for use in monitoring applications, as well as cryptographic approaches that may be considered for application in the specific scenario promoted by the PRISM approach (i.e., separation between front-end and back-end and po...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید